Early Warning Signs… And Resources ORRICK, HERRINGTON & SUTCLIFFE 213/612-2204 www.orrick.com BACKGROUND INTELLIGENCE, INC. 213/243-0707 www.backgroundintelligence.com.

Slides:



Advertisements
Similar presentations
Forensic Tools and Techniques for Internal Auditors
Advertisements

Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
ISRCL- Young Lawyers Anthony Gett Barrister & Senior Legal Officer Commonwealth Director of Public Prosecutions (Australia)
Association of Corporate Counsel Houston Chapter Meeting of June 8, 2010 What to Do When the Feds Come Knocking In-House Responsibilities for Criminal.
Corporate Governance Reform Professor Blanaid Clarke Trinity College Dublin Law Reform Commission Annual Conference 11th December 2012.
Keeping Energy Companies Out of Trouble- Dealing with the SEC Ethical Dilemmas, and Avoiding Criminal Liability Charles Parker Locke Liddell & Sapp LLP.
Maryland Crime Victims’ Resource Center, Inc.. Jani S. Tillery, Esquire (Point of Contact) Staff Attorney,Maryland Victims’ Resource Center.,Inc. (301)
INTRODUCTION o DISCUSS ADOPTION OF FRAUD AND THEFT POLICY o ASSIGNS RESPONSIBILITY FOR REPORTING FRAUD AND THEFT o PROVIDES GUIDELINES FOR INVESTIGATIONS.
Carl Hoecker Inspector General, US Capitol Police Chair, CIGIE Investigations Committee.
Monitoring and Prevention of Hate Crime (and Incidents) in Policing Work Chris Taylor Independent Consultant (Formerly Chief Inspector, London’s Metropolitan.
Time Share Fraud Investigations
Eurojust The European Union’s Judicial Cooperation Unit.
Risk Management a Case Study DATALAWS Information Technology Law Consultants Presented by F. F Akinsuyi (MSc, LLM)MBCS.
Form I-9 Process An Online Training for Supervisors and Designees Presented by Human Resources Revised November 2009.
Managing Fraud Risk in Government 2015 IIA District Conference March 10, 2015 David A. King, CPA, CFE – Director, Special Investigations North Carolina.
Page 1 U.S. Government Accountability Office (GAO) GAO’s Report on Electronic Disbursement of Federal Benefit Payments (GAO ) Presented by Kay Kuhlman,
Managing Fraud Risk in Higher Education 2014 UNC Fall Controller's Workshop November 10, 2014 David A. King, CPA, CFE – Director, Special Investigations.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Starting a Business Section 2-1 Starting a Business After the Background Entrepreneurial Resources Muncie Public Library.
1 Columbia Police Department, Phase IV Integrated Data Exchange & Analysis (IDEA) This project was supported by Grant No DG-BX-K021 awarded by the.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Private Detective & Investigator Quristain Hand. What Do They Do? (Duties)  Interview people to gather information  Do various types of searches, using.
FINANCIAL ELDER ABUSE IN REAL ESTATE TRANSACTIONS September, 2012 By: Kelly L. Greenwood Burchells LLP Barristers & Solicitors.
Application for Employment
Criminal Investigation Internal Revenue Service Internal Revenue Service Criminal Investigation (Accountants with Guns) Andrew T. Hromoko, Jr. Special.
THURSDAY, FEBRUARY 13, 2014 USING DATA TO CONSTRUCT YOUR AFFORDABILITY STRATEGY For the audio portion, please dial: US/Canada: Conference.
** Deckplate training for Navy Sailors **.  On Thursday, 9 July, the Office of Personnel Management (OPM) announced a cyber incident exposed the federal.
Texas House of Representatives Committee on Criminal Jurisprudence Testimony of Randall S. James Banking Commissioner Texas Department of Banking August.
1 FSAIF – Florida Seniors Against Investment Fraud Provided by:
Audits & Assessments: What are the Differences and How Do We Learn from the Results? Brown Bag March 12, 2009 Sal Rubano – Director, Office of the Vice.
Federal Bureau of Investigation
An Educational Computer Based Training Program CBTCBT.
Student Services I: Students with Disabilities & other Special Populations Fall 2013 Community College Counselor Conference.
Fighting Corruption - Hong Kong Experience By Mrs. Jean Au Yeung Assistant Director of Corruption Prevention Independent Commission Against Corruption.
9/19/ WCET Online Services Audit Tool - WCET/MnSCU Confidential WCET/MnSCU Audit Tool—Round 2 eStudent Services Committee Meeting June 24, 2004 Pat.
Technician Module 2 Unit 2 Slide 1 MODULE 2 UNIT 2 Planning, Assessment & Analysis.
Cyber Security Nevada Businesses Overview June, 2014.
Unfair Dealing and the Older Adult: Understanding the Lures, Questioning the Cures Professor Nina A. Kohn 2010 International Federation on Aging Conference.
Implementing the Standard on digital recordkeeping.
CSU HS Counselor Financial Aid. What does it cost? Cost of Attendance* (9 months) At HomeOn CampusOff Campus Fees $6,633 Books/Supp $1,682.
AmeriCorps Education Award Program Student Orientation.
State Watch Office SITUATIONAL AWARENESS Eric K. Conklin Deputy Chief of Operations
CashCourse for college students & Retirement Income Decumulation Think Tank Brent A. Neiser, CFP® ASEC Partners Fall 2008 Meeting Wednesday, October 22,
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
STANKIEWICZ. Essential Questions and Learning What is the purpose of criminal Investigation? What are the basic steps in criminal investigations? What.
Session 5 Anti-Money Laundering & Financial Crime Conducting or Supporting the Investigation Process Presented by ERM Institute Monday, 24 February 2014.
New EMIS Coordinator Training 12/13/13 Presenters: Brenda Hartley – OMERESA EMIS Support Tammy Hrosch – MDECA EMIS Services Manager.
WHITE COLLAR CRIME Lecture 13: Policing & Regulating White Collar Crime.
The 5 th IAACA Seminar 22 – 24 June 2013 Jinan, Shandong Province, China Chapter VI of UNCAC: Technical Assistance and Information Exchange Kevin P. Zervos,
Recognize the practices that have GA and SACSCOC implications Recognize the Substantive Change compliance processes, actions, and timeframes Identify.
© 2015 Kilpatrick Townsend November 5-6, 2015 Tribal In-House Counsel Association Inaugural Conference Keynote Address Venus McGhee Prince.
Office of the Guardian for Children and Young People Preventing abuse and improving the support for children who have been victims of crime while in care.
Investigations: Strategies and Recommendations (Hints and Tips) Leah Lane, CFE Director, Global Investigations, Texas Instruments, Inc.
FDIC Perspective on Environmental Risk Presented by: Gordon Stoner Legal Division Federal Deposit Insurance Corporation May 6, 2008.
Valiants Verify Compliance Program Judith W. Spain, J.D., CCEP ® Chief Ethics and Compliance Officer General Counsel (Effective March 2016) 1.
Montgomery College Acceptable Use Policy (AUP). 2 This Acceptable Use Policy (AUP) PowerPoint presentation was developed by the Office of the Information.
MASSACHUSETTS BANK REPORTING PROJECT Management Training A collaboration of The Executive Office of Elder Affairs The Office of the Attorney General The.
BATTLING A CANCER: TACKLING CORRUPTION IN PERU, Author: Blair Cameron Professor Jennifer Widner, Director Pallavi Nuka, Associate Director FOR.
2 United States Department of Education, Privacy Technical Assistance Center 1 Western Suffolk BOCES Data Breach Exercise.
crimes-report
Preventing Hate Crimes
INVESTIGATION PROCESS AND TECHNIQUE
Policy and Procedure Manual
Red Flags Rule An Introduction County College of Morris
Clemson University Red Flags Rule Training
Serious Misconduct at School:
Funded by the Justice Programme of the European Union
Presentation transcript:

Early Warning Signs… And Resources ORRICK, HERRINGTON & SUTCLIFFE 213/ BACKGROUND INTELLIGENCE, INC. 213/

?

“...not by the hand of Pablo Picasso.”

D epartment OF J ustice

 harvesting scam  Financial aid scam  Student aid heist  Textbook Scam  Website Hackers  U.S. News College Rankings Manipulation  Fake college enrollment  Terrorist Visas through fake college enrollment  Unqualified admissions for privilege  Student loan scandal

Based on Top Biggest College Scams  Former and current students  College presidents, university officials, trustees, director of admissions, and other administrators  International gangs  Politicians  Financial aid and lending institutions  Other, including grandmothers and multi- generational swindles

 Organized fraud rings and financial aid fraudsters target  University of Phoenix: 850 potential fraud schemes reported to federal authorities since 2009 (prosecution rate: approximately 25%)

Depends on:  Type of fraud or loss  Who is involved  Evidence  Corroboration from others Get facts:  Before making a major decision  Before reacting to a situation

 Follow your institution’s protocol and published Policies and Procedures Manual  Contact legal counsel (attorney-client privilege)  Get facts: fully investigate the incident with the assistance of independent professionals THEN…you can start to make intelligent decisions

 Interviews  Proprietary databases*  Public records  Internet and social networking sites  Surveillance, dumpster diving, undercover

 Verifying identities  Finding assets  Defining complex business structures and personal interrelationships  Identifying potential “bad guys” or people in cahoots with the bad buys  Clarifying anomalies  Identifying potential witnesses  Obtaining documentation and independent verification for self-reported “facts”

 Most fraud and white collar crime goes unreported  Only 8% of cases reach proper authorities  MEANING: they’re out there to do it again (Source: National Public Survey on White Collar Crime)

 Critical to understand:  The nature and extent of the fraud  The individual(s) involved  Domestic or international

 No panacea for dealing with fraud  Lengthy, dedicated, persistent effort  Leadership and coordination required

Fraud took place: June 2011  PRO-ACTIVE STEPS TAKEN  PROBLEMS  Unknown identity of the fraudster(s)  Unknown nature of the scam  Identifying other victims  Unknown potential sources of remuneration, due to all of the above

Tuesday, December 13, 2011 “Olivia, Per my office’s investigative supervisors, this case doesn’t meet our guidelines or the guidelines for the U.S. Attorney’s Office. If you get more victims and a higher dollar loss, please let us know.” Special Agent Los Angeles Field Office

 Community Colleges are adopting pro- active strategies  Challenges to financial aid applicants

 Disbelief…  Whistleblowers and victims are always placed in a challenging position  Victims are embarrassed at being duped MOSTLY…WANT TO AVOID BAD PRESS

Olivia Robinson BACKGROUND INTELLIGENCE, INC. 213/ Mark Mermelstein ORRICK, HERRINGTON & SUTCLIFFE 213/